Sciweavers

762 search results - page 61 / 153
» Modeling and Simulating Information Security Management
Sort
View
DILS
2005
Springer
14 years 1 months ago
Eco-Informatics for Decision Makers Advancing a Research Agenda
Resource managers often face significant information technology (IT) problems when integrating ecological or environmental information to make decisions. At a workshop sponsored by...
Judith Bayard Cushing, Tyrone Wilson
SACMAT
2010
ACM
14 years 17 days ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
IQ
2007
13 years 9 months ago
Simulations Of Error Propagation For Prioritizing Data Accuracy Improvement Efforts
: Models of the association between input accuracy and output accuracy imply that, for any given application, the effect of input errors on the output error rate generally varies i...
Irit Askira Gelman
TWC
2008
176views more  TWC 2008»
13 years 7 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
CONTEXT
2007
Springer
14 years 1 months ago
Context Modeling: Task Model and Practice Model
Contextual Graphs are a context-based formalism used in various real-world applications. They allow a uniform representation of elements of reasoning and of contexts for describing...
Patrick Brézillon